Consulting News

For a Safer Tomorrow

Supporting the nonprofit community through software donations: Since launching our software donation program in 2002, Symantec has helped more than 102,000 nonprofits and public libraries solve their biggest security challenges and protect against ever-evolving cyber security threats. In FY19, we worked with TechSoup to scale up our program from

Protect IT: Maintaining Your Digital Profile

Tips and recommendations for ways organizations can engage their people and help accomplish all of these goals are available in the NCSAM 2019 Tool Kit. Take advantage of the 2019 Tool Kit and the other resources NCSAM makes available.  The bottom line is that the internet is a great

Cracking the Passwords of Early Internet Pioneers

Lots of them weren’t very good: BSD co-inventor Dennis Ritchie, for instance, used “dmac” (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne shell command line interpreter, chose “bourne”; Eric Schmidt, an early developer of Unix software and now the executive chairman of Google

Endpoint Defense Starts with Prevention

About the Author Roi Abutbul VP Engineering, Symantec A post-exploit expert with 15 years of experience in network security, Roi is the former CEO and co-founder of Javelin Networks, acquired by Symantec. He is a lifelong entrepreneur, as well as having served with the Israeli Air Force

“BriansClub” Hack Rescues 26M Stolen Cards

15Oct 19 “BriansClub” Hack Rescues 26M Stolen Cards “BriansClub,” one of the largest underground stores for buying stolen credit card data, has itself been hacked. The data stolen from BriansClub encompasses more than 26 million credit and debit card records taken from hacked online and brick-and-mortar retailers

14th October – Threat Intelligence Bulletin

October 15, 2019 For the latest discoveries in cyber research for the week of 14th October 2019, please download our Threat Intelligence Bulletin TOP ATTACKS AND BREACHES Hackers have breached Volusion, provider of cloud hosted online stores, and used it to delivers malicious JavaScript code and steal

Cloud, Automation and the Future of DevSecOps

The DevOps approach was never really developed with security as a guiding principle. Speed was, and is, the number one priority. An unfortunate result is the seemingly endless headlines about data breaches, ransomware attacks, identity thieves and stolen personal information. So, what’s to be done? A solution

Cloud, Automation and the Future of DevSecOps

The DevOps approach was never really developed with security as a guiding principle. Speed was, and is, the number one priority. An unfortunate result is the seemingly endless headlines about data breaches, ransomware attacks, identity thieves and stolen personal information. So, what’s to be done? A solution

Factoring 2048-bit Numbers Using 20 Million Qubits

This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It’s interesting work, but I don’t want overstate the risk. We know from Shor’s Algorithm that both factoring and discrete logs are easy to solve on a large,

In the Footsteps of a Sextortion Campaign


Friday Squid Blogging: Apple Fixes Squid Emoji

Apple fixed the squid emoji in iOS 13.1: A squid’s siphon helps it move, breathe, and discharge waste, so having the siphon in back makes more sense than having it in front. Now, the poor squid emoji will look like it should, without a siphon on its

I Have a New Book: We Have Root

I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.) There is nothing in this book is that is not available for free on my website; but if

XG Firewall v18 early access is now available

We are excited to open the Early Access Program (EAP) of XG Firewall v18 to all Sophos customers and partners. This release offers a ton of great new features and innovations: Xstream Architecture delivers extreme new levels of visibility, protection and performance. Threat Intelligence Analysis stops zero-day

Details on Uzbekistan Government Malware: SandCat

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group’s lax operational security includes using the name of a military group with ties to the SSS to register a domain used in its attack infrastructure; installing Kaspersky’s

New Reductor Nation-State Malware Compromises TLS

Kaspersky has a detailed blog post about a new piece of sophisticated malware that it’s calling Reductor. The malware is able to compromise TLS traffic by infecting the computer with hacked TLS engine substituted on the fly, “marking” infected TLS handshakes by compromising the underlining random-number generator,

Sophos Cloud Optix now available on AWS Marketplace

As modern organizations are evolving their use of the public cloud to leverage scalable computing, storage, and network services, cybercriminals are adapting their techniques to exploit hidden vulnerabilities in network architecture. Your IT security, therefore, needs to evolve to match these new tactics and threats. Sophos Cloud

Wi-Fi Hotspot Tracking

Wi-Fi Hotspot Tracking Free Wi-Fi hotspots can track your location, even if you don’t connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes location-based marketing hotspot providers like Zenreach and Euclid is that the personal information you enter in

Microsoft fixes drop in number for October, 2019 updates

Last month started a bit overheated at Microsoft Security, when an out-of-band update was pushed for Windows in order to fix a browser bug being exploited in the wild. However, October’s Patch Tuesday brings with it fixes for an unexpectedly low number of security vulnerabilities: 56. Of

Cheating at Professional Poker

Cheating at Professional Poker Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether they aren’t just paranoia after hours and hours of digging into the mystery. Like the fact

Secure IT: Individual Responsibility and Cybersecurity

In essence, MFA renders an individual’s password virtually useless to a potential hacker. Individual accounts anchored to MFA require a cybercriminal to obtain a second level of proof before gaining access. Typically, this second level of proof is another user device, such as a smartphone, or increasingly,

Illegal Data Center Hidden in Former NATO Bunker

Interesting: German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs and other illegal activities. Seven people were arrested. […] Thirteen people aged 20 to 59 are under investigation in all, including three

Microsoft Patch Tuesday – October 2019

This month the vendor has patched 59 vulnerabilities, 9 of which are rated Critical. Cumulative Security Update for Microsoft Browsers VBScript Remote Code Execution Vulnerability (CVE-2019-1238) MS Rating: Critical A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. This

Patch Tuesday Lowdown, October 2019 Edition

09Oct 19 Patch Tuesday Lowdown, October 2019 Edition On Tuesday Microsoft issued software updates to fix almost five dozen security problems in Windows and software designed to run on top of it. By most accounts, it’s a relatively light patch batch this month. Here’s a look at